{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:15:43Z","timestamp":1760426143402,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10836-023-06071-w","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T06:02:43Z","timestamp":1686895363000},"page":"371-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0326-3282","authenticated-orcid":false,"given":"Vijaypal Singh","family":"Rathor","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Simranjit","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Sajwan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,16]]},"reference":[{"key":"6071_CR1","doi-asserted-by":"crossref","unstructured":"Abdel-Basset M, Abdel-Fatah L, Sangaiah AK (2018) Chapter 10 - metaheuristic algorithms: A comprehensive review. In: Sangaiah AK, Sheng M, Zhang Z (eds) Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications. Intelligent Data-Centric Systems. Academic Press, pp 185\u2013231. [Online]. https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780128133149000104","DOI":"10.1016\/B978-0-12-813314-9.00010-4"},{"issue":"3","key":"6071_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MDT.2012.2196252","volume":"30","author":"S Bhunia","year":"2013","unstructured":"Bhunia S, Abramovici M, Agrawal D, Bradley P, Hsiao MS, Plusquellic J, Tehranipoor M (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design & Test 30(3):6\u201317","journal-title":"IEEE Design & Test"},{"issue":"8","key":"6071_CR3","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proceeding of the IEEE 102(8):1229\u20131247","journal-title":"Proceeding of the IEEE"},{"key":"6071_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: Proceedings on Cryptographic Hardware and Embedded Systems-CHES 2009. Springer, pp 396\u2013410","DOI":"10.1007\/978-3-642-04138-9_28"},{"issue":"6","key":"6071_CR5","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10836-011-5255-2","volume":"27","author":"RS Chakraborty","year":"2011","unstructured":"Chakraborty RS, Bhunia S (2011) Security against hardware trojan attacks using key-based design obfuscation. J Electron Test 27(6):767\u2013785","journal-title":"J Electron Test"},{"issue":"2","key":"6071_CR6","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TETC.2017.2654268","volume":"5","author":"RS Chakraborty","year":"2017","unstructured":"Chakraborty RS, Pagliarini S, Mathew J, Rajendran SR, Devi MN (2017) A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans Emerg Top Comput 5(2):260\u2013270","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"3","key":"6071_CR7","first-page":"33","volume":"14","author":"X Cui","year":"2018","unstructured":"Cui X, Koopahi E, Wu K, Karri R (2018) Hardware trojan detection using the order of path delay. ACM Journal on Emerging Technologies in Computing Systems (JETC) 14(3):33","journal-title":"ACM Journal on Emerging Technologies in Computing Systems (JETC)"},{"issue":"18","key":"6071_CR8","doi-asserted-by":"publisher","first-page":"5165","DOI":"10.3390\/s20185165","volume":"20","author":"C Dong","year":"2020","unstructured":"Dong C, Xu Y, Liu X, Zhang F, He G, Chen Y (2020) Hardware trojans in chips: a survey for detection and prevention. Sensors 20(18):5165","journal-title":"Sensors"},{"key":"6071_CR9","doi-asserted-by":"crossref","unstructured":"Dupuis S, Ba P-S, Di\u00a0Natale G, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: Proceedings on IEEE 20th International On-Line Testing Symposium (IOLTS). IEEE, pp 49\u201354","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"6071_CR10","doi-asserted-by":"crossref","unstructured":"Goldstein LH, Thigpen EL (1980) Scoap: Sandia controllability\/observability analysis program. In: Proceedings on 17th Design Automation Conference. pp 190\u2013196","DOI":"10.1145\/800139.804528"},{"key":"6071_CR11","unstructured":"Haider SK, Jin C, Ahmad M, Shila DM, Khan O, van Dijk M (2014) Hatch: a formal framework of hardware Trojan design and detection. University of Connecticut Cryptology ePrint Archive Technical Report vol 943. p 2014"},{"key":"6071_CR12","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: Proceedings on 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, pp 203\u2013206","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"6071_CR13","doi-asserted-by":"crossref","unstructured":"Hicks M, Finnicum M, King ST, Martin MM, Smith JM (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In: Proceedings on IEEE Symposium onSecurity and Privacy (SP). IEEE, pp 159\u2013172","DOI":"10.1109\/SP.2010.18"},{"key":"6071_CR14","unstructured":"Jin Y, Makris Y (2008) Hardware trojan detection using path delay fingerprint. In: Proceedings on IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). IEEE, pp 51\u201357"},{"key":"6071_CR15","doi-asserted-by":"crossref","unstructured":"Lin L, Burleson W, Paar C (2009) Moles: malicious off-chip leakage enabled by side-channels. In: Proceedings on International conference on computer-aided design. ACM, pp 117\u2013122","DOI":"10.1145\/1687399.1687425"},{"issue":"2","key":"6071_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-9803-8","volume":"63","author":"Y Liu","year":"2020","unstructured":"Liu Y, He J, Ma H, Zhao Y (2020) Golden chip free trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. SCIENCE CHINA Inf Sci 63(2):1\u20133","journal-title":"SCIENCE CHINA Inf Sci"},{"issue":"2","key":"6071_CR17","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"T Meyarivan","year":"2002","unstructured":"Meyarivan T, Deb K, Pratap A, Agarwal S (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"issue":"4","key":"6071_CR18","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10836-018-5739-4","volume":"34","author":"M Nourian","year":"2018","unstructured":"Nourian M, Fazeli M, Hely D (2018) Hardware trojan detection using an advised genetic algorithm based logic testing. J Electron Test 34(4):461\u2013470","journal-title":"J Electron Test"},{"key":"6071_CR19","doi-asserted-by":"crossref","unstructured":"Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proceedings on Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp 465\u2013470","DOI":"10.7873\/DATE.2015.0352"},{"key":"6071_CR20","doi-asserted-by":"crossref","unstructured":"Pan Z, Mishra P (2021) Automated test generation for hardware trojan detection using reinforcement learning. In: Proceedings on 26th Asia and South Pacific Design Automation Conference. pp 408\u2013413","DOI":"10.1145\/3394885.3431595"},{"issue":"5","key":"6071_CR21","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s10836-017-5683-8","volume":"33","author":"VS Rathor","year":"2017","unstructured":"Rathor VS, Garg B, Sharma G (2017) New light weight threshold voltage defined camouflaged gates for trustworthy designs. J Electron Test 33(5):657\u2013668","journal-title":"J Electron Test"},{"issue":"3","key":"6071_CR22","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TETC.2018.2795706","volume":"8","author":"VS Rathor","year":"2020","unstructured":"Rathor VS, Garg B, Sharma GK (2020) A novel low complexity logic encryption technique for design-for-trust. IEEE Trans Emerg Top Comput 8(3):688\u2013699","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"8","key":"6071_CR23","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","volume":"102","author":"M Rostami","year":"2014","unstructured":"Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: models, methods, and metrics. Proc IEEE 102(8):1283\u20131295","journal-title":"Proc IEEE"},{"key":"6071_CR24","doi-asserted-by":"crossref","unstructured":"Saha S, Chakraborty RS, Nuthakki SS, Anshul, Mukhopadhyay D (2015) Improved test pattern generation for hardware trojan detection using genetic algorithm and Boolean satisfiability. In: Proceedings on International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp 577\u2013596","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"6071_CR25","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr VLSI Syst 20(1):112\u2013125","DOI":"10.1109\/TVLSI.2010.2093547"},{"issue":"2","key":"6071_CR26","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6071_CR27","doi-asserted-by":"crossref","unstructured":"Shekarian SMH, Zamani MS, Alami S (2013) Neutralizing a design-for-hardware-trust technique. In: Proceedings on 17th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2013). IEEE, pp 73\u201378","DOI":"10.1109\/CADS.2013.6714240"},{"issue":"4","key":"6071_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446837","volume":"20","author":"Z Shi","year":"2021","unstructured":"Shi Z, Ma H, Zhang Q, Liu Y, Zhao Y, He J (2021) Test generation for hardware trojan detection using correlation analysis and genetic algorithm. ACM Transactions on Embedded Computing Systems (TECS) 20(4):1\u201320","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"6071_CR29","doi-asserted-by":"crossref","unstructured":"Sturton C, Hicks M, Wagner D, King ST (2011) Defeating UCI: building stealthy and malicious hardware. In: Proceedings on IEEE Symposium on Security and Privacy (SP). IEEE, pp 64\u201377","DOI":"10.1109\/SP.2011.32"},{"key":"6071_CR30","doi-asserted-by":"crossref","unstructured":"Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings on ACM SIGSAC Conference on Computer & Communications Security. ACM, pp 697\u2013708","DOI":"10.1145\/2508859.2516654"},{"issue":"1","key":"6071_CR31","first-page":"6","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (TODAES) 22(1):6","journal-title":"ACM Transactions on Design Automation of Electronic Systems (TODAES)"},{"issue":"18","key":"6071_CR32","doi-asserted-by":"publisher","first-page":"20170682","DOI":"10.1587\/elex.14.20170682","volume":"14","author":"X Xie","year":"2017","unstructured":"Xie X, Sun Y, Chen H, Ding Y (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express 14(18):20170682\u201320170682","journal-title":"IEICE Electronics Express"},{"key":"6071_CR33","doi-asserted-by":"crossref","unstructured":"Zhang J, Yu H, Xu Q (2012) HtOutlier: hardware trojan detection with side-channel signature outlier identification. In: Proceedings on IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, pp 55\u201358","DOI":"10.1109\/HST.2012.6224319"},{"key":"6071_CR34","doi-asserted-by":"crossref","unstructured":"Zhang J, Yuan F, Xu Q (2014) Detrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proceedings on ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 153\u2013166","DOI":"10.1145\/2660267.2660289"},{"key":"6071_CR35","doi-asserted-by":"crossref","unstructured":"Zhang J, Yuan F, Wei L, Sun Z, Xu Q (2013) Veritrust: verification for hardware trust. In: Proceedings on 50th ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE, pp 1\u20138","DOI":"10.1145\/2463209.2488808"},{"issue":"7","key":"6071_CR36","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCAD.2015.2422836","volume":"34","author":"J Zhang","year":"2015","unstructured":"Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) Veritrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148\u20131161","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"6071_CR37","doi-asserted-by":"crossref","unstructured":"Zhou Z, Guin U, Agrawal VD (2018) Modeling and test generation for combinational hardware trojans. In: Proceedings on IEEE 36th VLSI Test Symposium (VTS). IEEE, pp 1\u20136","DOI":"10.1109\/VTS.2018.8368626"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06071-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06071-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06071-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T06:21:59Z","timestamp":1691562119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06071-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["6071"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06071-w","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"9 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}